Concept Guide

Setting Timeout for EXEC Privilege Mode................................................................................................................... 87
Using Telnet to get to Another Network Device.......................................................................................................... 87
Lock CONFIGURATION Mode....................................................................................................................................... 88
Viewing the Conguration Lock Status...................................................................................................................88
Viewing the Reason for Last System Reboot...............................................................................................................88
5 802.1X......................................................................................................................................................... 90
Port-Authentication Process.......................................................................................................................................... 92
EAP over RADIUS......................................................................................................................................................92
Conguring 802.1X...........................................................................................................................................................93
Related Conguration Tasks..................................................................................................................................... 93
Important Points to Remember......................................................................................................................................93
Enabling 802.1X................................................................................................................................................................ 94
Conguring dot1x Prole ................................................................................................................................................95
Conguring MAC addresses for a do1x Prole.............................................................................................................96
Conguring the Static MAB and MAB Prole .............................................................................................................96
Conguring Critical VLAN ..............................................................................................................................................97
Conguring Request Identity Re-Transmissions...........................................................................................................98
Conguring a Quiet Period after a Failed Authentication..................................................................................... 98
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 99
Re-Authenticating a Port.............................................................................................................................................. 100
Conguring Timeouts..................................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 102
Guest and Authentication-Fail VLANs.........................................................................................................................103
Conguring a Guest VLAN......................................................................................................................................103
Conguring an Authentication-Fail VLAN............................................................................................................. 103
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 105
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 105
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 106
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................106
Conguring ACL VLAN Groups.............................................................................................................................. 106
Conguring FP Blocks for VLAN Parameters....................................................................................................... 107
Viewing CAM Usage...................................................................................................................................................... 108
Allocating FP Blocks for VLAN Processes.................................................................................................................. 109
7 Access Control Lists (ACLs)........................................................................................................................ 111
IP Access Control Lists (ACLs)......................................................................................................................................112
CAM Usage................................................................................................................................................................113
Implementing ACLs on Dell EMC Networking OS.................................................................................................113
Important Points to Remember.....................................................................................................................................115
Conguration Task List for Route Maps.................................................................................................................115
Conguring Match Routes....................................................................................................................................... 117
Conguring Set Conditions......................................................................................................................................119
Congure a Route Map for Route Redistribution.................................................................................................120
Congure a Route Map for Route Tagging........................................................................................................... 120
Contents
5